Today we released the latest in our ongoing series of in-depth research reports into the Cybercriminal Underground. Today’s report, “The Brazilian Underground Market: The Market for Cybercriminal Wannabes?”, by Fernando Mercês, adds Brazil to the list of countries whose cybercriminal underground that Trend Micro’s Forward-Looking Threat Research Team has delved into. Many people outside of Brazil…

Wow. As expected, re:Invent 2014 was a whirlwind. Last week, AWS launched nine new services. Well, eight new standalone services and a new database engine that is important enough to be called a new service. Trend Micro was a diamond sponsor at the event, and we had a huge presence at the event. For this post,…

Google contacts not glasses; autonomous cars from Tesla and General Motors in many not just a few garages; and a major payment ecosystem reboot and cybercrime will continue to proliferate amongst the innovation of it all. These are just a few of the things I can be relatively certain will occur in the next 24-36…

Cable and Satellite TV have produced an influx of both wonderful content as well as garbage programming for us to try and sift through as consumers. As we can all attest, finding content that is important and meaningful to us can be a challenge. You rely on other’s opinions in addition to your own research…

Build with confidence from marknca on Vimeo. As an app developer, you know that security is important, but sometimes you can lose perspective as to why it’s important. Your users trust that when they share their data with your app, it will be safe. That trust is critical to your success and to your users’…

It is perhaps telling that when preparing this blog post, I had to add the word “wearables” to the dictionary of my word processor. We are still at the very beginning of the journey into an interconnected “Internet of Everything” but the truth is that every beginning exists in its own unique circumstances. The circumstances…

This is the 4th & final post in a short series on the shared responsibility model for security in the AWS Cloud. Please take a few minutes to read the others: part 1, part 2, and part 3 Shellshock Shellshock (which entails a number of CVE’s), is a bug that affects bash, a command line…

The month of October has been the National Cyber Security Awareness Month for the last few years, which is put on by the National Cyber Security Alliance which Trend Micro is a proud partner of. This year we had five weeks in October and each week focused on a different aspect of the security landscape…

Over the past 26 years, we’ve learned quite a few things about the information security industry here at Trend Micro. It’s not enough only to design great products that keep business, consumers and governments around the world safe from the latest cyber threats. We also need to actively engage with customers, partners and industry analysts…

Think for a minute about “targeted attacks.” When you think about them, who do you see as the targets of these kinds of attacks? Maybe you think of agencies of major world governments like the United States Defense Department. Or maybe your first thought is of major international financial powerhouses like JP Morgan. Odds are…